We are pleased to announce that Prescient Security will host a Capture the Flag (CTF) event at InfoSec North America on November 14-15. Stop by the CREST interactive booth area to see if you’ve got the skills to find all of the flags and win prizes!

HIPAA, Sarbanes Oxley Act (SOX), and PCI/DSS (Payment Card Industry) compliance standards address completely different aspects of your network and information, but a gap in either can cause serious pain for any company.

It’s not unknown that if a computers inputs are not sanitized, it’s applications could be vulnerable to various attacks. But during a recent Application Security Assessment, one of our Senior Security Consultants came across an interesting data sanitization insecurity that he says many analysts may be overlooking. Here is his overview of the insecurity and a recommendation on how to mitigate its risks.

Hiring a cyber security company can be a challenging endeavor. As with any highly technical field, it can be hard for consumers to accurately communicate what they need and understand what is being offered. Using these three characteristics, clients can help judge how to find the best fit for their security needs.

enableIT is pleased to announce it is a PCI (Payment Card Industry) Approved Scanning Vendor (ASV). Becoming an ASV was an educational process for this organization, as the process is an ever changing one. Here I’ve outlined some recent changes to the ASV certification and application processes, as well as how the certification of our organization benefits our clients.

MacKeeper, an increasingly popular MacBook optimization tool suite designed to improve overall system speed, has been revealed to have unintentionally exposed several instances of MongoDB containing sensitive customer data.

According to a recently released report from Kaspersky, distributed denial of service (DDoS) attacks for the third quarter of 2015 have given us a unique perspective on the future of DDoS trends. Attacks monitored during this period of time feature an attack sustained over 320 hours and include several noteworthy statistics.

The things that a computer system allows you to do with your cars nowadays are simply astounding. While there is still a lot to be determined as to how far these vehicle computer systems will go, one thing is for sure, with more computer interactivity comes more potential attack vectors for attackers.